Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

// // //
4/30/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Insider Threats Cost Enterprises More Than $8M Every Year Report

Insider threats, whether it's an employee with malicious intent or a worker is simply careless, can cost enterprises more than $8 million over the course of 12 months to clean up, according to a new report.

Insider threats, whether it's an employee looking to steal data to sell or simply a case of worker carelessness or neglect, are costing enterprises more and more money every year to clean up, according to a new report.

Specifically, enterprises are spending on average about $8.76 million during the course of a 12-month period to clean up from the damage that an insider security threat can cause.

It usually takes about two months to clean up from one of these incidents.

These and other findings are contained in a report "2018 Cost of Insider Threats: Global Organizations," conducted by the Ponemon Institute and sponsored by ObserveIT, a startup that specializes in employee monitoring and behavior analytics software for enterprise.

(Source: iStock)
(Source: iStock)

The study, released on April 24, is based on interviews with 717 securities practitioners from around the world, who reported more than 3,200 insider incidents over the course of the past year.

While outsider attacks, such as Advanced Persistent Threats (APTs), which are usually conducted by nation-states involved in espionage, draw the most attention, the report is a reminder to enterprises that some of the biggest threats are lurking around the cubicle corner of every office. (See APTs Are Rising in the East, Kaspersky Finds.)

For instance, in the past week, SunTrust Bank of Atlanta has started an investigation into whether a former employee possibly took personal data from customers. Overall, the company had to notify about $1.5 million customers of the possible theft, and offer credit monitoring. (See SunTrust Investigation Shows Continuing Threats Posed by Insiders.)

Over the last two years, insider threat clean-up costs increased over 100% from $4.3 million to the $8.76 million figure found in the last report. (The original 2016 Ponemon report only included US costs, while the new one released this month included global numbers.)

Since 2016, Ponemon estimates that the number of security incidents involving employee or contractor negligence has increased by 26%. At the same time, malicious or criminal intent, like the possible theft SunTrust in investigating, increased by nearly 53%.

Despite the rise in malicious insider attacks, it's still the negligent insider who is the cause of most security problems, with 64% of incidents related to carelessness and 23% tied to nefarious activities.

"The careless insider is frequently caused by employees or contractors who are simply trying to bypass broken or undocumented business practices to better accomplish their task, without regard for the potential ramifications of exposing internal data in inappropriate ways," ObserveIT CEO Mike McKee wrote in an email to Security Now.

"The malicious insider, however, is actively working to better understand your internal cybersecurity defenses and processes and how best to bypass them in order to avoid detection/prevention," McKee added. "The result of the insider threat and ultimate costs (value of data, lost productivity, fines, etc.) are often more complex and much higher than the careless insider case."


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

The biggest problem with insider threats is the loss or theft of company credentials. In fact the number of these incidents has doubled over the past two years, increasing by a staggering 170%, according to Ponemon.

In addition, size matters. Enterprises with more than 75,000 employees spent $20 million over the last year to resolve insider security lapses. Those companies with less than 500 workers spent about $1.8 million.

McKee added that regulations, such as the European Union's General Data Protection Regulation (GDPR) and US privacy laws, are also increasing costs to enterprises when it comes to insider clean-up. (See GDPR Compliance: Enterprises Have Two Options to Consider.)

Unsurprisingly, financial services spent the most on average to fix insider problems. On average it cost these enterprises about $12 million to resolve. Energy and utilities spent about $10 million and retail shelled out $8.8 million.

Finally, the report notes that large businesses in North America spent on average about $11 million last year to resolve these issues. That's more than enterprises in Asia-Pacific -- $5.9 million -- and Europe and the Middle East -- $7 million.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building the SOC of the Future
While an attacker just needs to find one vulnerability to get in to the network, the defender has to look everywhere. Defenders have to identify, disrupt, and stop attacks in the short period of time between when an attacker gets in and causes damage. One way is a security operations center to get that "all the time" coverage. What's Inside: --AI and cybersecurity response --Automation --Proctive threat hunting --Next-gen SIEM
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42074
PUBLISHED: 2022-10-07
Online Diagnostic Lab Management System v1.0 is vulnerable to SQL Injection via /diagnostic/editcategory.php?id=.
CVE-2022-42075
PUBLISHED: 2022-10-07
Wedding Planner v1.0 is vulnerable to has arbitrary code execution.
CVE-2022-37895
PUBLISHED: 2022-10-07
An unauthenticated Denial of Service (DoS) vulnerability exists in the handling of certain SSID strings by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected AP of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4...
CVE-2022-37896
PUBLISHED: 2022-10-07
A vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victimâ&euro...
CVE-2022-41377
PUBLISHED: 2022-10-07
Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /pet_shop/admin/?page=maintenance/manage_category.